A device cannot be secured if it is not in the inventory. Discovery is the first substantive act in network security — and it's a measurement problem, not a scanner you press play on. Work through the lessons, practice on a simulated network where you can measure exactly how much you found, then run it for real.
This network has a true population you can't see yet. Run the discovery methods in order; watch evidence merge into host records. Because the true count is known here (unlike a real network), you can measure exactly how complete and how sound your discovery was.
| IP | MAC (masked) | Vendor (inferred) | Existence |
|---|
Pick a question (or write your own). The tool packages your scan into a ready-to-use prompt — copy it into ChatGPT, Claude, or any AI assistant and get a plain-English answer. Your data goes only where you paste it.